Analysis

  • max time kernel
    151s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27/03/2024, 10:36

General

  • Target

    e1759a77b0e691e837303f104c66896b.exe

  • Size

    1.9MB

  • MD5

    e1759a77b0e691e837303f104c66896b

  • SHA1

    a5069270a0e8b1d167e0868cc93afd38a0ce74d2

  • SHA256

    a0b19680c9e2e5c4d0d968c267295f5bea30e6063869aedd15fcfff56c6b6b38

  • SHA512

    2c734cc863ac8f91ab7860472d18f3e8fd7329d5dd9352530c4245460d8fffcde458f28b1415977418a3b5e3699863f3308dbcc8c3676ae28a7243058e0483b7

  • SSDEEP

    49152:ISlNHydXboE+2pKWTvP6p9kB/GS0fsXCFJ:ISjydNCYn0+Q

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 4 IoCs
  • Identifies Wine through registry keys 2 TTPs 5 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Drops file in Windows directory 4 IoCs
  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1759a77b0e691e837303f104c66896b.exe
    "C:\Users\Admin\AppData\Local\Temp\e1759a77b0e691e837303f104c66896b.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1404
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2532
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2800
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2696
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            PID:2300
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 10:38 /f
            5⤵
            • Creates scheduled task(s)
            PID:2296
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 10:39 /f
            5⤵
            • Creates scheduled task(s)
            PID:2516
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 10:40 /f
            5⤵
            • Creates scheduled task(s)
            PID:2664
      • C:\Windows\Explorer.exe
        C:\Windows\Explorer.exe
        3⤵
          PID:1076

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Resources\spoolsv.exe

      Filesize

      1.9MB

      MD5

      959ef517c54994c6868d2e25db7c71ad

      SHA1

      208ecc065153fce47b77bd87063a0315bd0353a0

      SHA256

      0036e5704e55f8a9263e3c19b383631ad4c04325f8680697b78aa197ed2c6c78

      SHA512

      af83a2d95a086057890ea623a0393816dbe605c7d8927660b8caefbf8dbfd51a6f0cb26ff7c6d0f92633ccf5271a195f26dd4d3b3b9699be800cb9d4cc50446d

    • \??\c:\windows\resources\themes\explorer.exe

      Filesize

      1.4MB

      MD5

      9e6f5031a37e5efcd166faed929c59aa

      SHA1

      ea0acb2da09de4671d77e25027546b7331b15830

      SHA256

      99b5a3622572f5d5e84d1621ed55ddc72e29d80cf50cd44cba61fef7f5f42ee3

      SHA512

      d910cd5d863637359c9b71fecdc31ee14434aa44e733d7d568a39225037c42c5347a7b1c85ce00a2c4c40f93f0f296096bb0dc98d262e2a14239f7fa13791c6e

    • \Windows\Resources\Themes\explorer.exe

      Filesize

      1.9MB

      MD5

      b0bb01dac8e243dfa1e44cada32a782e

      SHA1

      c3f0f775e41ef7004ca4652d6f3587df52b6b27e

      SHA256

      abcf8d7dc5d67b7d6a1a5f7d6effe8cad720ab37a28376f77664df6524bf4bbb

      SHA512

      245f9873bba817eaa6ec89969714e51ce984d92ffc8e00f53f63578817a90f803fb643a79aee65aa934412cc3f3e1d801634349a150996c9ca73ea92461a1f70

    • \Windows\Resources\spoolsv.exe

      Filesize

      896KB

      MD5

      543b4f0ec5c2ac3bdf5cc59bb1bcbe20

      SHA1

      f3675841d6910d8ad74d017d581e4a6dd76e1b26

      SHA256

      e9ba65fb6cf657f1fb31ebf52923892f5d708c9e69cba433aee2641b12edf548

      SHA512

      3164ea1f304f9fd299e4713b511edef366ed471f5ad67295ba6489e25f5579a16987868a98c76c3143720bfa616e55712e01abcf6fd6d483efc983d4eea3a36c

    • \Windows\Resources\spoolsv.exe

      Filesize

      704KB

      MD5

      a8f5f52661d313d11d44778c63947443

      SHA1

      91c85b3c78241a467e17308abd2cb11f0ba39d0e

      SHA256

      0c11f2a60546b6cfe01dfe86b85e0abb0667ee4db07712a5e2620a66b6a44d85

      SHA512

      37ecf005b3d5e7a740d62da982dc706ff752e84875ef7c11c63da965be02d8d7ee513fdb7b8209d6c1d89318c865a3e9b6b5c1ccf63dd19b2924d46f03bee355

    • \Windows\Resources\svchost.exe

      Filesize

      726KB

      MD5

      82fdce4c55f4f746572cd94e79391772

      SHA1

      fc11454b6c329e655a85e88713c5c565d41c8290

      SHA256

      fbcd1df2e03a7d51f2af94f0f6765eda65a90478b056c950b44065218d012837

      SHA512

      9532d63c7cdaea5664ad8570ed1d8a988da15bccee405b8d15aa60480c91b48276757a42acf2547c0f4081335f8ed3a7103d4830c4b815fcbdade09b1d4204bc

    • \Windows\Resources\svchost.exe

      Filesize

      1.9MB

      MD5

      314189c8add5d2fe9bf806c385b9a895

      SHA1

      3a6a93a9988f198c26427fcdbc98ff2adbb9988c

      SHA256

      c271ae6c35406f9b1954bfc69ca4373b7b468abeef960eedc60bdf699f5ccad2

      SHA512

      ed7cea8cb33a3bd321cf2e2c8758adeb92962ac1496b7f8ec62f9cea095c125eb1c488951c748876f6f89ebf94babc2dc5e7c08c91948f8b4bec9126aa451da0

    • memory/1404-25-0x00000000048B0000-0x00000000048B1000-memory.dmp

      Filesize

      4KB

    • memory/1404-9-0x0000000004300000-0x0000000004301000-memory.dmp

      Filesize

      4KB

    • memory/1404-17-0x00000000048C0000-0x00000000048C1000-memory.dmp

      Filesize

      4KB

    • memory/1404-24-0x0000000004360000-0x0000000004361000-memory.dmp

      Filesize

      4KB

    • memory/1404-64-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/1404-23-0x0000000004290000-0x0000000004291000-memory.dmp

      Filesize

      4KB

    • memory/1404-22-0x00000000048A0000-0x00000000048A1000-memory.dmp

      Filesize

      4KB

    • memory/1404-21-0x00000000042D0000-0x00000000042D1000-memory.dmp

      Filesize

      4KB

    • memory/1404-18-0x00000000042B0000-0x00000000042B1000-memory.dmp

      Filesize

      4KB

    • memory/1404-16-0x0000000004880000-0x0000000004881000-memory.dmp

      Filesize

      4KB

    • memory/1404-15-0x00000000048D0000-0x00000000048D1000-memory.dmp

      Filesize

      4KB

    • memory/1404-14-0x0000000004310000-0x0000000004311000-memory.dmp

      Filesize

      4KB

    • memory/1404-13-0x00000000042E0000-0x00000000042E1000-memory.dmp

      Filesize

      4KB

    • memory/1404-11-0x00000000042F0000-0x00000000042F1000-memory.dmp

      Filesize

      4KB

    • memory/1404-10-0x0000000004280000-0x0000000004281000-memory.dmp

      Filesize

      4KB

    • memory/1404-33-0x0000000005180000-0x00000000055F3000-memory.dmp

      Filesize

      4.4MB

    • memory/1404-34-0x0000000005180000-0x00000000055F3000-memory.dmp

      Filesize

      4.4MB

    • memory/1404-1-0x0000000077DA0000-0x0000000077DA2000-memory.dmp

      Filesize

      8KB

    • memory/1404-0-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/1404-12-0x00000000042A0000-0x00000000042A1000-memory.dmp

      Filesize

      4KB

    • memory/1404-8-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/1404-41-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/1404-88-0x0000000076EA0000-0x0000000076F90000-memory.dmp

      Filesize

      960KB

    • memory/1404-87-0x00000000773B0000-0x000000007747C000-memory.dmp

      Filesize

      816KB

    • memory/1404-46-0x00000000773B0000-0x000000007747C000-memory.dmp

      Filesize

      816KB

    • memory/1404-47-0x0000000072940000-0x0000000072A93000-memory.dmp

      Filesize

      1.3MB

    • memory/1404-7-0x0000000072940000-0x0000000072A93000-memory.dmp

      Filesize

      1.3MB

    • memory/1404-83-0x0000000076EA0000-0x0000000076F90000-memory.dmp

      Filesize

      960KB

    • memory/1404-82-0x0000000072940000-0x0000000072A93000-memory.dmp

      Filesize

      1.3MB

    • memory/1404-81-0x00000000754B0000-0x00000000754C3000-memory.dmp

      Filesize

      76KB

    • memory/1404-50-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/1404-80-0x0000000075650000-0x00000000756D4000-memory.dmp

      Filesize

      528KB

    • memory/1404-79-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/1404-78-0x0000000004890000-0x0000000004891000-memory.dmp

      Filesize

      4KB

    • memory/1404-4-0x00000000773B0000-0x000000007747C000-memory.dmp

      Filesize

      816KB

    • memory/1404-2-0x0000000076EA0000-0x0000000076F90000-memory.dmp

      Filesize

      960KB

    • memory/1404-67-0x0000000005180000-0x00000000055F3000-memory.dmp

      Filesize

      4.4MB

    • memory/2300-164-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/2532-36-0x0000000076EA0000-0x0000000076F90000-memory.dmp

      Filesize

      960KB

    • memory/2532-35-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/2532-63-0x0000000004900000-0x0000000004901000-memory.dmp

      Filesize

      4KB

    • memory/2532-55-0x0000000004730000-0x0000000004731000-memory.dmp

      Filesize

      4KB

    • memory/2532-58-0x00000000048C0000-0x00000000048C1000-memory.dmp

      Filesize

      4KB

    • memory/2532-61-0x00000000046A0000-0x00000000046A1000-memory.dmp

      Filesize

      4KB

    • memory/2532-60-0x00000000048E0000-0x00000000048E1000-memory.dmp

      Filesize

      4KB

    • memory/2532-72-0x00000000051C0000-0x0000000005633000-memory.dmp

      Filesize

      4.4MB

    • memory/2532-213-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/2532-59-0x00000000048F0000-0x00000000048F1000-memory.dmp

      Filesize

      4KB

    • memory/2532-75-0x00000000051C0000-0x0000000005633000-memory.dmp

      Filesize

      4.4MB

    • memory/2532-76-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/2532-77-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/2532-56-0x0000000004720000-0x0000000004721000-memory.dmp

      Filesize

      4KB

    • memory/2532-57-0x00000000048B0000-0x00000000048B1000-memory.dmp

      Filesize

      4KB

    • memory/2532-54-0x00000000046B0000-0x00000000046B1000-memory.dmp

      Filesize

      4KB

    • memory/2532-53-0x0000000004880000-0x0000000004881000-memory.dmp

      Filesize

      4KB

    • memory/2532-52-0x0000000004690000-0x0000000004691000-memory.dmp

      Filesize

      4KB

    • memory/2532-51-0x00000000046C0000-0x00000000046C1000-memory.dmp

      Filesize

      4KB

    • memory/2532-84-0x0000000076EA0000-0x0000000076F90000-memory.dmp

      Filesize

      960KB

    • memory/2532-85-0x00000000773B0000-0x000000007747C000-memory.dmp

      Filesize

      816KB

    • memory/2532-86-0x0000000072940000-0x0000000072A93000-memory.dmp

      Filesize

      1.3MB

    • memory/2532-42-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/2532-43-0x0000000004890000-0x0000000004891000-memory.dmp

      Filesize

      4KB

    • memory/2532-211-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/2532-209-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/2532-207-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/2532-38-0x0000000072940000-0x0000000072A93000-memory.dmp

      Filesize

      1.3MB

    • memory/2532-37-0x00000000773B0000-0x000000007747C000-memory.dmp

      Filesize

      816KB

    • memory/2532-62-0x00000000048A0000-0x00000000048A1000-memory.dmp

      Filesize

      4KB

    • memory/2532-205-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/2532-189-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/2532-203-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/2532-191-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/2532-201-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/2532-193-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/2532-199-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/2532-195-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/2532-197-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/2696-190-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/2696-198-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/2696-194-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/2696-200-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/2696-192-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/2696-202-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/2696-210-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/2696-204-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/2696-196-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/2696-206-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/2696-214-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/2696-208-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/2696-212-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/2800-178-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/2800-89-0x0000000076EA0000-0x0000000076F90000-memory.dmp

      Filesize

      960KB

    • memory/2800-90-0x00000000773B0000-0x000000007747C000-memory.dmp

      Filesize

      816KB

    • memory/2800-74-0x0000000000400000-0x0000000000873000-memory.dmp

      Filesize

      4.4MB

    • memory/2800-92-0x0000000072940000-0x0000000072A93000-memory.dmp

      Filesize

      1.3MB